Updating Results
Updating Results

Search Courses

Showing 131 items

  • Australian Data and Cyber Institute (ADCI)

    Australian Data and Cyber Institute (ADCI)

    Cyber Security is the practice of protecting electronic data systems from criminal or unauthorised attacks. Cyber Security serves as a preventative measure to defend confidential data and protect data processes and procedures from unwanted breaches.

    Entry Requirements

    In order to qualify for entry to the Bachelor of Data Science applicants must meet the course entry criteria as prescribed. International students who's first language is not English must also meet the English Proficiency Requirements. Please refer to the prescribed course Entry Requirements.

  • Murdoch University

    Murdoch University

    This intensive course will allow you achieve a professional doctorate in Information Technology.

    Entry Requirements

    To be eligible for admission as a candidate for a Doctor of Information Technology, an applicant must have: *a Bachelor Degree with at least a 2A Honours normally in the same discipline (AQF level 8); or *a Masters Degree normally in the same discipline (AQF level 9) and satisfy the Dean of Graduate Studies with evidence of substantive and significant scholarly or professional attainments; or *a Bachelor Degree normally in the same discipline (AQF level 7) and satisfy the Dean with evidence of substantive and significant scholarly or professional attainments including satisfactory research preparation equivalent of AQF level 8 or 9.

  • Murdoch University

    Murdoch University

    Future proof your career opportunities and graduate with a flexible skill set that makes you highly employable in an uncertain future by undertaking a combined Law and IT degree.

    Entry Requirements

    90 ATAR or equivalent - Students who have successfully completed the Murdoch College course with a minimum average mark of 78% or higher

  • Murdoch University

    Murdoch University

    Interested in pursuing a career in business and IT? Learn to design innovative analysis systems strategies, skills that are in high demand globally.

    Entry Requirements

    As per usual undergraduate requirements

  • The University of Western Australia (UWA)

    The University of Western Australia (UWA)

    Become an industry-ready software engineer with real-world experience in just four years.

    Entry Requirements

    Admission requirements

    The University of Western Australia welcomes applications from international and domestic school-leavers. If you're interested in studying this major, find out the admission details below.

    Minimum entry requirements
    Minimum entry requirements

    Below you'll find a list of admission equivalencies for this course's Australian Tertiary Admissions Rank (ATAR).

    Indonesian Sekolah Menengah Atas (SMA) - Pass of 65
    • 79
    Monash University Foundation Year
    • 270
    South Korean College Scholastic Ability Test (CSAT)
    • 330
    Trinity College Foundation
    • 300
    University of Western Australia College (UWAC) Foundation Program
    • 66
    Western Australian Universities' Foundation Program (WAUFP)
    • 60
    Western Australian Certificate of Education (WACE) 2016 onwards
    • 80
    Below you'll find a list of admission equivalencies for this course's Australian Tertiary Admissions Rank (ATAR).
    Admission requirements
    For applicants with recent secondary education, information on admission criteria is available on our entry requirements page or on the UWA Handbook for course specific requirements and prerequisites.
    Admission requirements
    Admission Requirements
    • Scaled score of at least 50 in Mathematics Methods ATAR

    • Scaled score of at least
      one
      of the following three subjects*: Chemistry ATAR, Physics ATAR or Mathematics Specialist ATAR


      *All three subjects are recommended. If you do not have all three, then you can use up to two of your free electives to pick up missing prerequisite knowledge in your first year.
    Admission Requirements
    ADMISSION REQUIREMENT English competency

    English is the language of instruction and assessment at UWA and you will need to meet the English language requirements of the University to be eligible for a place.

    Minimum overall IELTS score of 6.5, with no band less than 6.0.

    ADMISSION REQUIREMENT English competency
  • National Institute of Technology

    National Institute of Technology

    In this Microsoft 365 Fundamentals course, you will learn how to: Differentiate between the various cloud service models. Identify the key differences between Microsoft 365 subscriptions. Plan for migration to Microsoft 365 services.

    Entry Requirements

    Key Topics Module 1: Cloud computing
    • Define cloud computing.
    • Describe the shared responsibility model.
    • Define cloud models, including public, private, and hybrid.
    • Identify appropriate use cases for each cloud model.
    • Describe the consumption-based model.
    • Compare cloud pricing models.
    Module 2: Benefits of using cloud services
    • Describe the benefits of high availability and scalability in the cloud.
    • Describe the benefits of reliability and predictability in the cloud.
    • Describe the benefits of security and governance in the cloud.
    • Describe the benefits of manageability in the cloud.
    Module 3: Cloud service types
    • Describe Infrastructure as a Service (IaaS).
    • Describe Platform as a Service (PaaS).
    • Describe Software as a Service (SaaS).
    • Identify appropriate use cases for each cloud service (IaaS, PaaS, SaaS)
    Module 4: What is Microsoft 365
    • Describe Office 365, Microsoft 365, and Windows 365
    • Describe how Microsoft 365 empowers workers for hybrid and flexible work
    • Create a Microsoft 365 trial organization
    Module 5: Productivity solutions of Microsoft 365
    • Describe how the capabilities of Microsoft 365 can boost productivity
    • Describe how Microsoft 365 Apps help people craft compelling content in real time
    • Describe how the capabilities of the work management tools optimize operations
    • Describe additional Microsoft 365 productivity apps
    Module 6: Collaboration solutions of Microsoft 365
    • Describe how the collaboration tools of Microsoft 365 promote synergy in the workplace
    • Describe how Microsoft Teams helps boost teamwork
    • Describe how Microsoft Viva helps organizations create thriving work cultures
    • Describe how Yammer communities can help foster connections within your organization
    Module 7: Endpoint modernisation, management concepts and deployment options of Microsoft 365:
    • Describe the endpoint modern management capabilities of Microsoft 365
    • Describe the differences between Windows 365 and Azure Virtual Desktop
    • Describe the deployment and release models for Windows-as-a-Service
    • Describe the deployment methods and update channels for Microsoft 365 Apps
    Module 8: Analytics capabilities of Microsoft 365
    • Describe how Viva Insights helps people and organizations work smarter and achieve balance
    • Describe the capabilities of the Microsoft 365 admin center and user portal
    • Describe the reports available in the Microsoft 365 admin center and other admin centers
    Module 9: Services and identity types of Azure AD
    • Describe what Azure AD does.
    • Describe the types of identities Azure AD supports.
    Module 10: Access management capabilities of Azure AD
    • Describe Conditional Access in Azure AD.
    • Describe the benefits of Azure AD roles and role-based access control
    Module 11: Threat protection with Microsoft 365 Defender
    • Describe the Microsoft 365 Defender service.
    • Describe how Microsoft 365 Defender provides integrated protection against sophisticated attacks.
    • Describe and explore the Microsoft 365 Defender portal.
    Module 12: Security capabilities of Microsoft Sentinel
    • Describe the security concepts for SIEM and SOAR.
    • Describe how Microsoft Sentinel provides integrated threat management.
    • Describe the pricing models of Microsoft Sentinel.
    Module 13: Compliance management capabilities of Microsoft Purview
    • Describe the Microsoft Purview compliance portal.
    • Describe Compliance Manager.
    • Describe the use and benefits of compliance score.
    Module 14: Service Trust Portal and Privacy at Microsoft
    • Describe the offerings of the Service Trust Portal.
    • Describe Microsoft's Privacy principles.
    • Describe Microsoft Priva
    Module 15: Microsoft 365 pricing, licensing, and billing options
    • Describe the pricing models available for Microsoft Cloud services
    • Describe billing management features such as billing frequency and methods of payment
    • Describe the differences between base licensing and add-on licensing
    Module 16: Support offerings for Microsoft 365 services
      • Describe the support offerings available for Microsoft 365 and how to create a support request
      • Describe service level agreement (SLA) concepts
      • Identify how to track service health through the Microsoft 365 admin center
      • Describe how organizations can provide feedback on Microsoft 365 products and services
  • Murdoch College

    Murdoch College

    Our Diploma of Information Technology is an 8-unit course taught over two or three trimesters. It has been designed as a pathway to a Bachelor of Information Technology (Business Information Systems) degree for domestic and international students.

    Entry Requirements

    Entry Requirements

    If you are an international student, you must demonstrate English proficiency of IELTS 5.5 overall (each band 5.0 or above) or equivalent.

    You will also need to meet the academic entry requirements to enrol in this program.

    • Completion of Australian high school Year 12 with an ATAR of 50, or international equivalent.

    For detailed information about the academic entry requirements for your country of origin please refer to our Entry Requirements page.

  • Murdoch University

    Murdoch University

    If you're an information technology professional looking to pursue a senior management role, specialise in data science and advance your IT career - the Master of Business Administration / Master of Information Technology is for you.

    Entry Requirements

    Recognised Bachelor's degree in IT (AQF Level 7) AND evidence of two years of professional work experience; OR recognised non-IT Bachelor's degree plus an approved Diploma in IT (AQF Level 8); OR recognised non-IT Honours degree (AQF Level 8) plus five or more years of relevant experience. Recognition of relevant and current informal or non-formal learning may be used for entry requirements and should be discussed with the Academic Chair.

  • Murdoch University

    Murdoch University

    With a Master of Science in Information Technology, you'll upgrade your information technology qualifications and experience to help take your career to the next level.

    Entry Requirements

    Recognised Australian Computer Society (ACS) accredited Bachelor's degree in IT (AQF Level 7); OR Recognised Bachelors' degree (AQF Level 7) plus an approved qualification in IT (AQF Level 8); OR Recognised Honours degree (AQF Level 8) plus 5 or more years of relevant experience. Recognition of relevant and current informal or non-formal learning may be used for entry requirements, and should be discussed with the Academic Chair.

  • Murdoch University

    Murdoch University

    Are you looking to further your career in information technology? This course will allow you to take the first step in developing as an IT professional and expanding your qualification and knowledge within the field.

    Entry Requirements

    Recognised Bachelor's degree in IT (AQF Level 7); OR Recognised Bachelor's degree (AQF Level 7) in a STEM discipline, other than IT, with appropriate levels of training in programming or data science or data analytics; OR Recognised non-IT Bachelor's degree (AQF Level 7) and two years of relevant professional experience; OR Recognition of demonstrated knowledge and skills through informal and non-formal learning and extensive relevant professional experience (5 years plus), subject to the approval of the Academic Chair.

  • Murdoch University

    Murdoch University

    Get the technical, problem solving and professional skills you need to be in high demand across almost every industry with a Bachelor of Information Technology.

    Entry Requirements

    ATAR of 70.

  • National Institute of Technology

    National Institute of Technology

    This training course in Azure Fundamentals is tailored for IT professionals who are new to Azure. This audience is eager to acquaint themselves with our offerings and gain practical exposure to the product.

    Entry Requirements

    Key Topics
    • Module 1: Cloud computing concepts.
      • Define cloud computing.
      • Describe the shared responsibility model.
      • Define cloud models, including public, private, and hybrid.
      • Identify appropriate use cases for each cloud model.
      • Describe the consumption-based model.
      • Compare cloud pricing models.
    • Module 2: Benefits of using cloud services
      • Describe the benefits of high availability and scalability in the cloud.
      • Describe the benefits of reliability and predictability in the cloud.
      • Describe the benefits of security and governance in the cloud.
      • Describe the benefits of manageability in the cloud.
    • Module 3: Cloud service types
      • Describe Infrastructure as a Service (IaaS).
      • Describe Platform as a Service (PaaS).
      • Describe Software as a Service (SaaS).
      • Identify appropriate use cases for each cloud service (IaaS, PaaS, SaaS).
    • Module 4: Azure architectural components
      • Describe Azure regions, region pairs, and sovereign regions.
      • Describe Availability Zones.
      • Describe Azure data centres.
      • Describe Azure resources and Resource Groups.
      • Describe subscriptions.
      • Describe management groups.
      • Describe the hierarchy of resource groups, subscriptions, and management groups.
    • Module 5: Azure compute and networking services
      • Compare compute types, including container instances, virtual machines, and functions.
      • Describe virtual machine (VM) options, including VMs, Virtual Machine Scale Sets, availability sets, Azure Virtual Desktop.
      • Describe resources required for virtual machines.
      • Describe application hosting options, including Azure Web Apps, containers, and virtual machines.
      • Describe virtual networking, including the purpose of Azure Virtual Networks, Azure virtual subnets, peering, Azure DNS, VPN Gateway, and ExpressRoute.
      • Define public and private endpoints.
    • Module 6: Azure storage services
      • Compare Azure storage services.
      • Describe storage tiers.
      • Describe redundancy options.
      • Describe storage account options and storage types.
      • Identify options for moving files, including AzCopy, Azure Storage Explorer, and Azure File Sync.
      • Describe migration options, including Azure Migrate and Azure Data Box.
    • Module 7: Azure identity, access and security
      • Describe directory services in Azure, including Azure Active Directory (AD) and Azure AD DS.
      • Describe authentication methods in Azure, including single sign-on (SSO), multifactor authentication (MFA), and passwordless.
      • Describe external identities and guest access in Azure.
      • Describe Azure AD Conditional Access.
      • Describe Azure Role Based Access Control (RBAC).
      • Describe the concept of Zero Trust.
      • Describe the purpose of the defense in depth model.
      • Describe the purpose of Microsoft Defender for Cloud.
    • Module 8: Cost management in Azure
      • Describe factors that can affect costs in Azure.
      • Compare the Pricing calculator and Total Cost of Ownership (TCO) calculator.
      • Describe Azure Cost Management Tool.
      • Describe the purpose of tags.
    • Module 9: Tools for governance and compliance in Azure
      • Describe the purpose of Azure Blueprints.
      • Describe the purpose of Azure Policy.
      • Describe the purpose of resource locks.
      • Describe the purpose of the Service Trust portal.
    • Module 10: Tools for managing and deploying Azure resources
      • Describe Azure portal.
      • Describe Azure Cloud Shell, including Azure CLI and Azure PowerShell.
      • Describe the purpose of Azure Arc.
      • Describe Azure Resource Manager (ARM) and Azure ARM templates.
    • Module 11: Monitoring tools in Azure
      • Describe the purpose of Azure Advisor
      • Describe Azure Service Health
      • Describe Azure Monitor, including Azure Log Analytics, Azure Monitor Alerts, and Application Insights
  • Edith Cowan University (ECU)

    Edith Cowan University (ECU)

    Master of Cyber Security

    Masters (Coursework)

    Be a trusted leader at the forefront of cyber security.

    Entry Requirements

    To gain entry to the Master of Cyber Security, applicants must:

    • Have a Bachelor degree in any discipline, or;
    • Demonstrate a minimum of five years' relevant professional experience
    • All applicants must satisfy English competency standards
    Special entry

    Special entry may be considered for students with a cognate first degree (or with appropriate experience) who can apply for a reduced course duration:

    1.5 years full time (3 years part time) - 180 credit points

    Admission is based on:

    • Bachelor degree in a related discipline*, or
    • Bachelor degree in any discipline, plus five years relevant work experience^, or
    • Graduate Certificate of Cyber Security (or equivalent), or
    • Evidence of academic capability judged to be equivalent.

    *Related discipline refers to any cyber security/ICT-related discipline
    ^Relevant work experience constitutes Senior/Managerial positions to be approved by the Course Coordinator.

  • Kaplan Business School

    Kaplan Business School

    The Graduate Certificate in Business Analytics is suitable for students already employed in business who desire an enriched understanding of how analytics can enhance their decision-making in the workplace - irrespective of the position they hold.

  • The University of Western Australia (UWA)

    The University of Western Australia (UWA)

    Cybersecurity

    Non-Award

    With a major in Cybersecurity from UWA, you'll be ready for a range of specialist cybersecurity roles. With a major in Cybersecurity from UWA, you'll be ready for a range of specialist cybersecurity roles.

    Entry Requirements

    Admission requirements

    The University of Western Australia welcomes applications from international and domestic school-leavers. If you're interested in studying this major, find out the admission details below.

    Minimum entry requirements
    Minimum entry requirements

    Below you'll find a list of admission equivalencies for this course's Australian Tertiary Admissions Rank (ATAR).

    Indonesian Sekolah Menengah Atas (SMA) - Pass of 65
    • 75.5
    Monash University Foundation Year
    • 254
    South Korean College Scholastic Ability Test (CSAT)
    • 324
    Trinity College Foundation
    • 280
    University of Western Australia College (UWAC) Foundation Program
    • 61
    Western Australian Universities' Foundation Program (WAUFP)
    • 56
    Western Australian Certificate of Education (WACE) 2016 onwards
    • 75
    Below you'll find a list of admission equivalencies for this course's Australian Tertiary Admissions Rank (ATAR).
    Admission requirements
    For applicants with recent secondary education, information on admission criteria is available on our entry requirements page or on the UWA Handbook for course specific requirements and prerequisites.
    Admission requirements
    Mathematics requirement

    This major requires a certain level of Mathematics. If you do not meet this level, you may be able to take additional Mathematics units in your first year to satisfy this requirement.

    WACE prerequisite: Mathematics Methods ATAR

    Mathematics requirement
    ADMISSION REQUIREMENT
    English competency

    English is the language of instruction and assessment at UWA and you will need to meet the English language requirements of the University to be eligible for a place.

    Minimum overall IELTS score of 6.5, with no band less than 6.0.

    ADMISSION REQUIREMENT
    English competency
  • Murdoch University

    Murdoch University

    Learn how to manage, protect and leverage data collected from everyday activities to drive business decisions, solve social problems, and inform better healthcare with a Graduate Diploma in Artificial Intelligence and Data Science. 

    Entry Requirements

    Recognised Australian Computer Society (ACS) -accredited Bachelor's degree in IT (AQF Level 7); OR recognised Bachelor's degree (AQF Level 7) plus an approved qualification in IT (AQF Level 8); OR recognised Bachelor's degree(AQF Level 7) plus two years of relevant IT experience; OR recognised Honours degree (AQF Level 8) plus relevant IT experience. Recognition of relevant and current informal or non-formal learning may be used for entry requirements, and should be discussed with the Academic Chair.

  • Murdoch University

    Murdoch University

    Learn the analytical skills, theories and strategies you need to build an exciting career in global security, where every working day will be different.

    Entry Requirements

    As per normal undergraduate admission requirements. A minimum ATAR of 70 is required.

  • National Institute of Technology

    National Institute of Technology

    This course is designed to provide you with training in the skills and knowledge required to become a computer networking professional.

    Entry Requirements

    Entry Requirements

    To check the entry requirements, refer to the Entry Requirements web page.

  • TAFE International Western Australia

    TAFE International Western Australia

    Start your career in the fast growing information technology (IT) industry with this qualification. This course will provide you with the knowledge to develop basic network administration skills.

    Entry Requirements

    • An IELTS score (academic) of 6.0 with no band score less than 5.0 or equivalent.

    • Completion of the equivalent of Australian Year 10.

    Please view Admission requirements for your country of origin.

  • Edith Cowan University (ECU)

    Edith Cowan University (ECU)

    Be a trusted leader at the forefront of cyber security.

    Entry Requirements

    To gain entry to the Graduate Certificate of Cyber Security, applicants must:

    • Have a Bachelor degree in any discipline, or;
    • Demonstrate a minimum of five years' relevant professional experience
    • All applicants must satisfy English competency standards